False alarms: The fake news of the control room

Functioning democracies are based on the ability of well-informed public to shape its views and cast its vote accordingly. However, when the public cannot discern between genuine facts and alternative facts (AKA fake news), it undermines the foundation of our democracies. To fill this gap Wikipedia founder Jimmy Wales recently introduced the WikiTRIBUNE, a website where news stories are backed by a community checking and rechecking all facts geared to be a source for verified evidence-based journalism.

The situation in the control room is analogous. These unwanted alerts are the fake news of the security industry. They clutter the view of the operators and limit their ability to understand the situation at hand and make an informed decision on how to respond. But can they be filtered out to leave only actionable intelligence about real incidents, as the WikiTRIBUNE does? As new sensors and systems have been diligently invested in, with the intention of improving the ability to prevent, detect and respond to incidents, an unwanted consequence has been a sharp uplift in false alarms. There has been evidence to suggest that US forces are losing as much as 6.5 million man hours to false alarms In fact, it has been suggested that false alarms can consume 90% of a control room operator s shift and that comes at considerable cost, far above and beyond the operator s time (although the impact should not be underestimated). In the extreme, closing a platform in a rail station, shutting an airport terminal, or evacuating a bank, for example, can see costs rises to millions in the blink of an eye. To illustrate the extent of this problem, we worked with a large European bank that was having to deal with a massive 19,000 false alarms each year. To place this in context, the cost of every resulting police dispatch was $50.

This issue of false alerts is also having a significant impact on police resources, with estimates of annual costs reaching $1.8bn (in the US) for their response. With police resources stretched, as a result of budget tightening and the global threat level, which remains high, it is an unwanted and wholly unnecessary distraction. In fact, there has been evidence to suggest that police forces (again in the US) are losing as much as 6.5 million man hours to false alarms. Root-cause analysis A root-cause analysis to determine the scale of false alarms in your organisation is imperative, but the critical factor in beginning to reduce them is to understand what is triggering them and this can throw up some surprises. Is there an issue with the location of a sensor? Has the right piece of kit been specified for its specific use? Has it been installed correctly? Is there a reliability issue with a certain vendor over another? Crucially, this isn t a one-off exercise.

It needs to be an ongoing, ingrained programme of monitoring to ensure operators are presented with actionable intelligence that is combined with a best-practice-driven response to every incident: situation management. It is not to suggest that it is possible to eradicate all false alarms, but it is a realistic expectation to drastically reduce the volume and frequency of them. In turn this helps operators to filter the noise and focus on the meaningful aspects of their job. The aforementioned European bank was able to reduce its false alarms to 1,200 per annum. It has achieved this through the use of its situation management (otherwise known as PSIM) system to correlate information and provide video confirmation of alarms in real time. By integrating all data feeds coming in to the control room and presenting a single operating picture, a situation management system provides situational awareness that in turn enables operators to be far more confident in being decisive about what is false, what is fact and how to best respond. Jon Denial is executive director at JPMorgan Chase and is quoted as saying: Filtering false alarms and focusing on the important information gives us real-time situational awareness. With an ever-increasing array of sensors and systems being made available to control rooms, the issue of false alarms is not abating. If anything, it is only going to get worse if it goes unchecked.

The time has come to filter out the fake news in the control room. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Key trends driving PSIM discussions

Info4Security Web Exclusive Key trends driving PSIM discussions Darren Chalmers-Stevens continues his series of PSIM-based commentaries with an overview of key trends informing the debate. Victor Hugo once said: Nothing is more imminent than the impossible, and that what we must always foresee is the unforeseen Let s be frank. Sometimes, security can seem like a ‘no-brainer’ to the layperson.

You keep an eye on the grounds or facilities, keep track of anyone who isn t supposed to be there and respond as needed when an event or attempted security breach occurs. Right? Well, while we in the industry know it s nowhere near that simple, at the core it’s true to say that many of the most significant differences in security from one organisation to another tend to be based on dissimilarities in procedures and technological capability.

The trouble – and, ultimately, the confusion – stems from a single word. Integration. As organisations everywhere strive to protect their assets in a world increasingly rife with complex digital and physical equipment and operating systems, one of the greatest challenges is the integration of newer, sleeker, cutting-edge technologies that all-too-often prove incompatible with their more cumbersome, less ‘intelligent’ legacy technology cousins.

What s needed is a solution that can bridge the gap without breaking the bank. Addressing the incompatibility issue One solution being adopted to address this incompatibility is Physical Security Information Management (or PSIM) software. PSIM software correlates, analyses and presents vast amounts of data from disparate technologies (including network management applications critical to business and building operations) into one common operating picture.

With these capabilities, it’s fair to say PSIM has transformed real-time security communications, operations and collaboration. In our discussions with clients and partners, three primary trends surface as being responsible for driving the current interest in PSIM integration and the associated purchasing discussion. They are situation management, identity management and building management.

On that basis, let’s explore the background to – and specific examples of – each of these trends. Situation management integration PSIM s unique ability to integrate systems and provide a complete, real-time picture enables organisations to monitor and swiftly respond to even the most complex of situations both efficiently and effectively. It also helps operators follow pre-set company procedures to ensure a positive, safe and secure outcome, be it averting an actual physical attack or protecting an intangible – such as the share price or brand – through mitigation of potential negative publicity because of a data breach or IP loss.

PSIM further aids security operators in matters of compliance, providing the on-the-spot information and tools to enable appropriate responses within set rules, regulations or policies. Its after-action reporting capabilities even provide means to, if necessary, prove beyond reasonable doubt in a Court of Law (or to C-level corporate governance) that the organisation followed the correct process and procedures in terms of safeguarding personnel and property. Identity management integration One great step already taken by many organisations to safeguard personnel and property is the management of multiple IDs from a logical and physical perspective.

Yet, despite this, the question remains: ‘What specific actions should be taken when an event or alarm is raised by the identity management systems?’ By integrating existing identity solutions with PSIM, organisations can ensure their policies are enacted and procedures followed to stop or prevent security breaches or ID theft. More specifically, logical and physical security convergence enables operators to cross reference individuals access control requests with their VPN log-in status, avoiding situations in which unauthorised persons find (and attempt to gain building access by using) a card that doesn’t belong to them. Combining physical-logical identity and access integration with strict policy reinforcement can also eliminate the act of tailgating , whereby someone slips into an organisation behind someone else badging in (either by accident or on purpose).

Even in the most chaotic of scenarios, such as a fire evacuation, PSIM is able to collate and draw from vast amounts of data. That data can serve to calculate an accurate headcount of on-premise visitors, contractors and employees to help emergency personnel better understand and manage the situation. For example, the fire brigade may only send two engines to a building with five people stuck inside.

However, if PSIM software helps detect 150 people inside, the response of the fire brigade would alter drastically and, potentially, many more lives would be saved. Building management integration While PSIM is known for its situational response capabilities, it also has broad applications for day-to-day organisational operations. One of the often unsung attributes of PSIM is its capacity for building management system (BMS) integration.

Since PSIM is intended to integrate and provide a complete view across multiple systems and technologies, it’s uniquely capable of interfacing with existing BMS solutions to manage facilities operations, up to and including the advancement of ‘smart’ buildings. Some everyday examples of PSIM/BMS functionality include: monitoring of alarms and events ‘out of hours’ to free up staff for proactive tasks such as maintenance and physical patrols adjustment of heating or cooling based on usage levels by integrating access control and the BMS through PSIM implementation support and monitoring of energy efficiency or ‘green’ building initiatives Smart buildings with lighting, HVAC etc that fluctuate based on actual occupancy and usage Helping operators to take control If a situation does arise, PSIM helps operators take control: providing verification and resolution capabilities (procedure and policy for guards and engineers to follow) to BMS alerts and events by integrating with collaborative tools from security systems. For example: checking to ensure that flow controllers are shut during a fire evacuation providing situational awareness around BMS alerts such as a broken down lift (in this scenario, PSIM could aid operators by providing access to the lift camera and auto-activating the lift intercom to allow audio reassurance to those stuck inside) As organisations and agencies across the globe continue to grow and evolve, it’s abundantly clear that keeping pace with technology development to maintain and secure their assets has to be a top priority.

Rather than purchasing a full new system at every turn, those with purchasing power are looking for solutions that will integrate with their existing technologies and extend their value while providing solutions to their situation management, identity management and BMS needs. The future is clear. PSIM is both the bridge and the solution.

Darren Chalmers-Stevens is vice president (EMEA operations) at VidSys *To learn more about PSIM or VidSys send an e-mail to: [email protected]

Library Security Guard poses as a police officer pulls over REAL …

Library officials on Wednesday suspended the system’s assistant security director, without pay following allegations he fitted his white SUV with dashboard lights and stopped a 2005 Lexus going 80 mph on the Lodge Freeway near Wyoming on Oct. 6.

Three problems: That’s miles away from any library; security guards can’t issue citations, and the motorist the guard allegedly stopped and asked for ID was Detroit Police Officer.

From The Detroit News1


  1. ^ From The Detroit News (

Polar Pro’s GoPro Dive Housing Magenta Filter -Solves UK Green Ocean Issue- @

Polar Pro’s GoPro Dive Housing Magenta Filter -Solves UK Green Ocean Issue-

List Price

Current Price

  • Correcting the auto white balance on the GoPro; restoring blue colors to underwater video
  • Makes for a great filter for dive housing in most Saltwater Areas around the UK in Restoring Colors
  • The filter is easily installed by removing the 10 screws on the lens window and popping the filter in.
  • The Screws do require a special T6 star screwdriver to remove.
  • This Filter work great in a body of water were algae is present

The GoPro Magenta Filter will work best when filming in depths of 2 to 65 feet especially in the green ocean waters around the UK! It is not recommended to use a Magenta filter in less than 2 feet of water because there is still enough natural light present for the camera to meter the colors correctly. To install this product one needs to use a T6 screwdriver to install it in-between the dive house glass and lens.

More Camera Products

Stewards told to get physical | Scottish Licensed Trade News

Home Current issue, News123

September 6 2012

THOUSANDS of bars and clubs across the UK risk being unable to trade if their door stewards fail to complete new training required by the Security Industry Authority (SIA).

That s the warning from trade body the BII, which urged operators to ensure stewards complete new training in physical intervention demanded of individuals renewing SIA licences from February 4, 2013.
The training is part of the award in door supervision course, which was launched in June 2010, so only door supervisors with older pre-June 2010 qualifications will need to take the new up-skilling door supervisors award.
The training, which includes physical intervention skills and how to deal with terrorist threats, is expected to be a day-long course costing around 100; the cost of renewing an SIA licence, which is valid for three years, is 220.
BII chief Peter Thomas said the situation could reach crisis point if the industry doesn t take urgent action.
We are urging licensees and security agencies to ensure their door staff get the necessary qualification in place well before their employees current SIA licences run out, or risk being caught up in any last minute rush for compliance, he said.



  1. ^ Home (
  2. ^ View all posts in Current issue (
  3. ^ View all posts in News (

BII door staff supervisor SIA training

The British Institute of Innkeeping (BII) has warned pubs, bars and hospitality businesses using door staff to ensure all their employees have the correct level of training or face ‘crisis point’ when new Security Industry Authority (SIA) conditions become mandatory.

The British Institute of Innkeeping (BII) has warned pubs and hospitality businesses to address the 'critical' issue of door staff security training before new regulations come into force

The British Institute of Innkeeping (BII) has warned pubs and hospitality businesses to address the ‘critical’ issue of door staff security training before new regulations come into force

The new standards, which come into force in February next year, will require all security staff and door supervisors to have undertaken physical intervention training before they can renew their SIA license.

Crisis point

The training has been compulsory for new door supervisors since June 2010 but it will now be necessary for all staff with the previous qualification looking to renew their licence.

“This is a business-critical issue,” Peter Thomas, the BII chief executive, warned. He said thousands of staff were likely to be affected and businesses needed to act now or risk the situation reaching ‘crisis point’.

“We estimate that there are between 50,000-60,000 licensed venues that will be affected by the new requirements. We are urging licensees and security agencies to ensure their door staff get the necessary qualification in place well before their employee s current SIA licences run out, or risk being caught up in any last minute rush for compliance.”


Door supervisors with the old award will only be able to carry on without taking the new training if they do not carry out ‘licensable activities’ – they will be able to apply for a security guarding licence when they renew with the SIA.

The new ‘Up-Skilling Door Supervisors’ award includes physical intervention training, how to escort customers off the premises safely, awareness of terrorist threats, first aid skills and guidance on dealing with 14 to 18-year-olds.

In response to the changes, the BII has launched a new course in May; the BIIAB Level 2 Award for Upskilling Door Supervisors.

The warning from the BII comes just over a month since the Home Office introduced new guidance for staff checking ID for proof-of-age. The guidelines now allow the use of military ID in licensed premises.

For more tips and advice on how to check ID without alienating young customers read our latest Ask the Experts column here.1


  1. ^ Ask the Experts column here. (

A Short Revelation on Trapwire, Cubic, and Public Surveillance, Kept

Yesterday or something close to it, I posted a very long and, er, multi-faceted article explaining not only Trapwire, its coverage, its connections, and why Adrian Chen is a really shitty “reporter” who gets things consistently wrong because he is under zero pressure from John Cook, but also other stuff I forget. 5 percent of the people who commented on Twitter or e-mail or what have you said something about early sentences being long and no paragraphs making it hard to read. I will never add paragraphs now just for spite because I hate people like that. If god knows how many other people, including dozens of journalists who either linked to it or tweeted it or interviewed me after it, as well as plenty who probably don’t know much about the issue, can understand it and even write articles based in part on what it says here, and if dozens of those “basement-dwelling kids” at Anon can understand it, you can fucking understand it. If not, don’t ever read my shit, and kill yourself because you commented on some fucking guy’s paragraph structure and tendency to write seven-part sentences when he’s been (1) out drinking a bit earlier because it’s his fucking birthday and now he’s writing about some bs called Trapwire instead of hanging with gf and friend who is now over, and (2) drank a pot of coffee and smoked a bunch of pot cause he enjoys that and doesn’t care if the news he writes for free is written all wacky-like for 20 fucking percent of it. Incidentally, every single fucking person who commented on Daily Kos as of just now has done so solely to complain about lack of paragraphs aside from the many divisions that are actually there. The cute thing is that I predicted it 1(although after the 1st comment) an hour before. Were it not for the fact that some people would justly benefit from a summary, or perhaps don’t want to read 2000 words covering entire epic in detail, I would never cater to the demands of those people. Those people do not deserve to live in democracies and should be exiled to a 50-mile section of the Sahara, surrounded by light Janjaweed patrols who occasionally venture inward for… “access control.” Like a portion of yesterday’s, this comes from e-mail I wrote, this time today, to a journalist I know and to the editor of a major publication that has paid attention to these issues before and actually done digging on them. Hope it’s of use to those who realize that this issue’s low media profile is a low point in national security reporting across U.S., Australia, and elsewhere. In addition to paragraphs, I have added three lines of asterixs sp? to separate the various clumps of sentences so they’ll never ever touch. Fuck you.

There’s a story kind of struggling for air, on a self-asserted CCTV “data-mining” capability called Trapwire – erroneous/incredibly incomplete coverage in NYT, better in coverage by NBC and Daily Caller and couple others I was quoted in last night, few very informative pieces in less-exposed outlets. My group Project PM as well as Wikileaks (which is being covered ATM only in context of Assange troubles, which are indeed key) and Telecomix have been working on it for a week now, mostly last 48 hours, based on the original materials, which stem from the 5.2 million Stratfor e-mails taken by Anon and now being distributed in groups by topic by volunteers at Wikileaks who have access to the entire set.

Portion removed for privacy of another activist. Meanwhile, a syndicated article that appeared on the 13th in at least six major Australian outlets including Sydney Herald was entirely pulled from all of them next day, and the much-delayed explanation (which apparently appeared in Herald print today, but not anywhere at all online, other than a vague and somewhat odd Tweet by one of the two authors who’s also an editor, that Cubic Corporation – which acquired Abraxas, parent in turn of spin-off Abraxas Applications – made some sort of complaint to the effect that it itself is not really “connected” to Trapwire since, apparently, it was developed, marketed, and then put into motion via the spin-off two years before Cubic felt inclined to purchase Abraxas.

That Cubic managed to hide any association with another, less official “spin-off” of Abraxas, Ntrepid – with which Abraxas shares key board members and draws upon capabilities developed/maintained by Anonymizer, which Abraxas bought shortly before its own purchase by Cubic, and which seems to have been created entirely to win (which it did) a bid for persona management software (fake online people) put out by USAF in 2010 and later confirmed by CENTCOM spokesman to be in operation at McDill and Kabul, under use of “multinational forces” and under Earnest Voice. When this first came out of the HBGary e-mails that my other “associates” seized from them in early 2011 (after they made threatening remarks to FT about allegedly having identified our “lieutenants” and our non-existent “co-founder and leader” and planning to talk to FBI, which was itself very bizarre), we did a lot of “media outreach” on the issue, and then when two very good colleagues of mine from The Guardian did a report on it, they never discovered that Ntrepid had any connection to Cubic at all, which wasn’t mentioned in the piece. Six months later one of my guys at PM finally found a 2010 Cubic tax filing that showed Ntrepid, like Abraxas, is “wholly owned” by Cubic.

So now that’s at least out there – at least to those who happen to read our niche wiki on intelligence contracting affairs. A few reporters and other folks with megaphones or access, but most not too regularly.

Despite the “question” of whether Cubic has anything to do with the direction of Trapwire as it has with at least other, even less “official” spin-offs of Abraxas (as proven by merger records and a couple other documents pulled up just in last few days), and insomuch as that one of those even notes Cubic’s expected “synergies” from Abraxas merger – and of course this question is allegedly the reason why an article was disappeared and not edited or corrected or even initially acknowledged and even still not acknowledged in any way that the majority who read the now-gone story online can see it for themselves, NYT does not mention Cubic at all in its piece yesterday, which claims fears of it are “wildly exaggerated” based on what reporter was told by DHS officials who are unnamed and not quoted. Here:

In two years of following this issue closely and sometimes being directly involved, I have never seen anything like this. At the least, I hope this will give you some insight into how ill-equipped the U.S. media in particular has been to cover this trillion-dollar topic in almost any meaningful way, and want to thank you again for what Businessweek has done and for allowing someone with my views to take part in your very timely panel last month. Thanks, and hope all is well. Here is info we’ve compiled, plus samples of insightful coverage of Trapwire and our work on it, much from last 24 hours: (a partly silly piece I wrote last night that nonetheless includes much of the new documentation, tax records, etc)

Vaguely corrupt marketing partnership between the ex-State Department types and self-described “intel analysts” at Stratfor and Trapwire itself, which is supposed not to have any similar or more complex dealings with its ultimate owner unlike other sub-subsidies such as Ntrepid:


  1. ^ I predicted it (

PROCESS SERVER | TOP-SK Private Investigators Services


According to the definition, process is a legal document that is issued by the court of the law towards the person being sued in order to order him to do something or refrain him from doing something. He is asked to defend himself in the court 2of the law. The person being sued is told by this document that he is being sued. It also tells the details of litigation3 and also to give him an opportunity so that he can appear in the court of the law and defends himself.

Service of the process may be divided into three types. Personal service means that the process is delivered to the defendant in person by a person which is authorized by the court of the law. Substitute service is the one in which another person instead of the defendant is delivered the process. This substituted person is also authorized by the court of the law. Constructive service is the third type of service wherein the litigation details are sent to be published in an authentic newspaper4 and the defendant is sent a mail consisting of a copy of the original pleading and notice.

Court proceeds in its proceedings only when the proof of the service5 has been provided. Proof of the service includes all the details of the service; date and time of the delivery, manner of delivery, details of the person who delivered and the details of receiver. It includes the description of the receiver; his skin color, color of his hairs, sex, an approximation of his age, weight. It should also include any other identifying features of the receiver. .Without providing the proof of service, the service becomes an absurd one and the court of law does not proceed. Service of the process is a sensitive issue and has great value in the eye of the court. Whole the process is one in a very systemic manner. Some pitfalls are needed to be avoided.

– Sunday should be spared i.e. service should not be made on Sunday.

– Never state anything on a false certificate regarding the service.

– Do not conceal any fact related to the process. Provide the court of the law with all the true details. Hiding or concealing fetches nothing but frustration in further proceedings.

– Summons should be delivered openly and it should not be enveloped. It is a requirement of the court of the law that summons is given in person and non-enveloped.

– Process servers should be reliable and resourceful.

– The server should not give legal advice to any one whom he is serving the process. This should be made clear that the server is not a legal advisor of anyone. All that he needs to do is to just deliver the process to the defendant.

– One should not be double minded. After having sent the process one should not take it back. This gives a very poor message on your part.

– Be rationale throughout the process and don t try to use extravagant force in order to serve the process.

In constructive type of service, most important thing to keep in mind is that the importance in this kind of service is of publication. In some types of constructive service just publication is enough and no other procedure is required to initiate the proceedings in the court of the law. Personal and substituted services give court of law personal jurisdiction over the defendant 6so that judgment can be passed. In constructive service court of law attains jurisdiction7 over something by which the party seeking relief can be entertained.

By: Private Detector Singapore SK Investigation Services8


  2. ^ court (
  3. ^ litigation (
  4. ^ newspaper (
  5. ^ service (
  6. ^ defendant (
  7. ^ jurisdiction (
  8. ^ Private Detector Singapore SK Investigation Services (